# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
74c0776e164d9695838ddddff76f4c31b3129d4310929b60113d9addd3f3ec38
Pseudo Output
9adf1d23f9ed4740d4bcd6e1b514f61b6525d235b48381c0dd5cb37d69f8a65c
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
7e2089b061e71345173c4758e171731b538c0714d6db5eaf98c684082f3e8b6e
Commitment
344a8e9f68eb196f3d760e4e921cc0a70939eb2cbe2bf19d912c095d9a7c4f2f
Range Proof
672 bytes (Bulletproof)
Memo
9d1c0d5b827d46a0ce8ad9a56e726554858485fca1141453642eb42fcf705d03264b7f9046eaf979c2c577385e3889912cd7b77dbef8b2c0ff753ca565b8fc84f63389f86fe50ae0ffd9e339a1e1f423a0acc9d7b2cc4ec982bc6cc5c98925af40ad534434e03de05154ca73620c45434cacc1157138c93ec20ce58b5d3f8d53 (encrypted)
Stealth Address
b8e5a2b1b030f1c883c68d21f0aa8de16f10ec78d8560de33711c8f8e3e50b40
Commitment
101c879e72ddb1573d2c5c125cb568754e077d4ded85fe1a6443a425c45ac805
Range Proof
672 bytes (Bulletproof)
Memo
d222ed635db4e5e3cd20fa77ac1e932bc6545a9a4a73008dd65bc9222b0561834b3f3f2da2015ecb42ee5334e51b3ebffdf673b02c36129ba57d0e45ac06d5b502cb296d964110bba9f782c976b2eb1c9e51eaa199446fa46efaaa25837ed7c3c8057362adebc6ccecbe09b844f9a30fa424db0f3d5d8026abdca292d7b6891c (encrypted)